Jianhua Sun

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
A Compact 2-DOF Cross-Scale Piezoelectric Robotic Manipulator With Adjustable Force for Biological Delicate Puncture.
IEEE Trans. Robotics, 2024

2023
Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition.
Signal Process., July, 2023

A 5 cm-Scale Piezoelectric Jetting Agile Underwater Robot.
Adv. Intell. Syst., April, 2023

Development of an Antihydropressure Miniature Underwater Robot With Multilocomotion Mode Using Piezoelectric Pulsed-Jet Actuator.
IEEE Trans. Ind. Electron., 2023

An Enhanced Storm Warning and Nowcasting Model in Pre-Convection Environments.
Remote. Sens., 2023

2022
Robust active finite-time control of gas compressor system surge in the presence of unmatched disturbance and uncertainty.
J. Syst. Control. Eng., 2022

2020
Design and Development of the Fire Sensor System of Fitness Club Based on the Internet of Things.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

Towards a Believable Decoy System: Replaying Network Activities from Real System.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Establishing and Verifying the Ergonomic Evaluation Metrics of Spacecraft Interactive Software Interface.
Proceedings of the Advances in Artificial Intelligence, Software and Systems Engineering, 2020

2019
Automated IoT Device Fingerprinting Through Encrypted Stream Classification.
Proceedings of the Security and Privacy in Communication Networks, 2019

UBER: Combating Sandbox Evasion via User Behavior Emulators.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

Three-Dimension Model and Rapid Prototyping of Car Interior Handle Based on Reverse Engineering.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

Cognitive Ergonomic Evaluation Metrics and Methodology for Interactive Information System.
Proceedings of the Advances in Artificial Intelligence, Software and Systems Engineering, 2019

2017
Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
DESIR: Decoy-enhanced seamless IP randomization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
An implementation of IEEE 1588 protocol for IEEE 802.11 WLAN.
Wirel. Networks, 2015

2014
ELOTS: Energy-efficient local optimization time synchronization algorithm for WirelessHART networks.
Proceedings of the IEEE International Systems Conference, 2014

Call sequence prediction through probabilistic calling automata.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

2013
HPar: A practical parallel parser for HTML-taming HTML complexities for parallel parsing.
ACM Trans. Archit. Code Optim., 2013

2012
The Moderating Effect of Legitimacy and Reputation on SMEs in a B2B Environment.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

2007
Exponential Stability of Reaction-diffusion Fuzzy Recurrent Neural Networks with Time-Varying Delays.
Int. J. Bifurc. Chaos, 2007

Global Exponential Stability and Periodic oscillations of Reaction-diffusion BAM Neural Networks with Periodic Coefficients and General Delays.
Int. J. Bifurc. Chaos, 2007

Mean Value Exponential Stability of Stochastic Reaction-diffusion Generalized Cohen-grossberg Neural Networks with Time-Varying Delay.
Int. J. Bifurc. Chaos, 2007

2006
Energy-efficient broadcast and multicast routing in multihop <i>ad hoc</i> wireless <i>networks</i>.
Wirel. Commun. Mob. Comput., 2006

A Brief Survey on Constructing homoclinic Structures of soliton Equations.
Int. J. Bifurc. Chaos, 2006

2005
Bifurcation, Exact Solutions and nonsmooth Behavior of solitary Waves in the Generalized Nonlinear SchrÖdinger equation.
Int. J. Bifurc. Chaos, 2005

Convergence Dynamics of Stochastic Reaction-diffusion Recurrent Neural Networks with Delays.
Int. J. Bifurc. Chaos, 2005

2004
Topology Control of Ad Hoc Wireless Networks for Energy Efficiency.
IEEE Trans. Computers, 2004

2003
Super link-connectivity of iterated line digraphs.
Theor. Comput. Sci., 2003

Energy-efficient broadcast and multicast routing in ad hoc wireless networks.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

2002
Multicast routing, load balancing, and wavelength assignment on tree of rings.
IEEE Commun. Lett., 2002

1998
Business rule extraction techniques for COBOL programs.
J. Softw. Maintenance Res. Pract., 1998

1996
Business Rule Extraction from Legacy Code.
Proceedings of the COMPSAC '96, 1996

1994
Data-Centered Program Understanding.
Proceedings of the International Conference on Software Maintenance, 1994

Automatic variable classification for COBOL programs.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994


  Loading...